1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Step2247 [10]
3 years ago
9

I just want a refund please. Thank you

Computers and Technology
1 answer:
Nina [5.8K]3 years ago
7 0
Unfortunately you can’t be refunded points. Sorry :(
You might be interested in
What type of system security malware allows for access to a computer, program, or service without authorization?
olasank [31]

Answer:

"backdoor" is the correct answer for the above question

Explanation:

  • The backdoor is a type of attack which is done by the type of backdoor programs to remotely access the computers without the authorization of the user of the computer.
  • It is inserted on the computer with the help of the internet and accessed the computer without using authorization techniques.
  • The above question asked about the virus which is used to access the computer without the permission of the right use of the system. Hence the answer is backdoor which is defined above.
7 0
3 years ago
Write a program Using loops to display the following patterns –
lukranit [14]

Answer:mm, no se como

Explanation:ayudarte

5 0
3 years ago
When students have computer trouble they usually are expected to
Kitty [74]

Answer: A) Make any simple fixes on their own.

5 0
3 years ago
Read 2 more answers
Data in the form of digits is called
Flauer [41]
Numeric data because it consist of numbers
5 0
2 years ago
Which of the following careers is part of the Printing Technology pathway?
torisob [31]
Textile designer i think

6 0
3 years ago
Other questions:
  • Should I learn Python, C++, C# or VB to start off programming games for Windows. Open to other language recommendations as well!
    6·1 answer
  • A(n) _______________ loop usually occurs when the programmer forgets to write code inside the loop that makes the test condition
    13·1 answer
  • Which one of these is correct PI of a XML document?
    13·1 answer
  • Lines s, t, and u are perpendicular bisectors of the sides FGH and meet at J. If JG=2x+2, JH=2y-4, JF=8 and HI=3z-3, find x, y,
    15·2 answers
  • Colin Mackay Inc., a software company with its head office in Amsterdam, has employees across three continents. Certain project
    11·1 answer
  • A TCP Sender is just about to send a segment of size 100 bytes with sequence number 1234 and ack number 436 in the TCP header. W
    5·1 answer
  • Which of the following does Secure Sockets Layer (SSL) use to authenticate a user or system before encrypting a session?
    14·1 answer
  • How scientist and technology beliefs society
    14·1 answer
  • Jeri wants to make sure she designs her web site for a specific group of people. What will help her plan who will visit the site
    8·2 answers
  • (40 PTS) Be specific
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!